Gi7w0rm / MalwareConfigLists
Just some lists of Malware Configs
☆168Updated last month
Alternatives and similar repositories for MalwareConfigLists:
Users that are interested in MalwareConfigLists are comparing it to the libraries listed below
- Free training course offered at Hack Space Con 2023☆137Updated last year
- Purpleteam scripts simulation & Detection - trigger events for SOC detections☆177Updated 2 months ago
- LOLAPPS is a compendium of applications that can be used to carry out day-to-day exploitation.☆180Updated this week
- The LOLBins CTI-Driven (Living-Off-the-Land Binaries Cyber Threat Intelligence Driven) is a project that aims to help cyber defenders und…☆118Updated 10 months ago
- IOC Stream and Command and Control Database Containing Command and Control (C2) Servers Detected Daily by ThreatMon.☆61Updated last year
- A repository of credential stealer formats☆193Updated last month
- ☆196Updated last year
- ☆155Updated last year
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆146Updated 5 months ago
- ☆132Updated last year
- A ProcessMonitor visualization application written in rust.☆178Updated last year
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆60Updated last year
- CLI tools for forensic investigation of Windows artifacts☆325Updated 3 months ago
- ShellSweeping the evil.☆163Updated 2 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆290Updated 6 months ago
- Detection Engineering with YARA☆87Updated last year
- Completely Risky Active-Directory Simulation Hub☆99Updated last year
- A collection of CVEs weaponized by ransomware operators☆104Updated last month
- Some Threat Hunting queries useful for blue teamers☆124Updated 2 years ago
- ☆65Updated 2 years ago
- The Threat Actor Profile Guide for CTI Analysts☆104Updated last year
- Raw data from Threat Intelligence Reports with automatic reports collection and keyword search across thousands of reports☆89Updated this week
- ☆327Updated this week
- Nuclei templates for honeypots detection.☆196Updated last year
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated 9 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆261Updated last year
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆100Updated 6 months ago
- 🏴☠️💰 Another Ransomware gang tracker☆177Updated this week
- An analytical challenge created to test junior analysts looking to try performing proactive and reactive cyber threat intelligence.☆193Updated 7 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆131Updated last year